[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230511012034.902782-1-kuba@kernel.org>
Date: Wed, 10 May 2023 18:20:27 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: tariqt@...dia.com
Cc: netdev@...r.kernel.org,
Jakub Kicinski <kuba@...nel.org>
Subject: [RFC / RFT net 0/7] tls: rx: strp: fix inline crypto offload
Tariq, here are the fixes for the bug you reported.
I managed to test with mlx5 (and selftest, obviously).
I hacked things up for testing to trigger the copy and
reencrypt paths.
Could you run it thru your tests and LMK if there are
any more regressions?
Jakub Kicinski (7):
tls: rx: device: fix checking decryption status
tls: rx: strp: set the skb->len of detached / CoW'ed skbs
tls: rx: strp: force mixed decrypted records into copy mode
tls: rx: strp: fix determining record length in copy mode
tls: rx: strp: factor out copying skb data
tls: rx: strp: preserve decryption status of skbs when needed
tls: rx: strp: don't use GFP_KERNEL in softirq context
include/linux/skbuff.h | 10 +++
include/net/tls.h | 1 +
net/tls/tls.h | 5 ++
net/tls/tls_device.c | 22 ++---
net/tls/tls_strp.c | 185 +++++++++++++++++++++++++++++++++--------
net/tls/tls_sw.c | 4 +
6 files changed, 177 insertions(+), 50 deletions(-)
--
2.40.1
Powered by blists - more mailing lists